This page contains an overview of our terms and policies.

Terms and policies

Terms of Use

Use of this website is subject to the following conditions:


These terms of use apply to websites owned by Cyso Hosting BV including By using this site you agree to comply with these terms of use.

Intellectual Property Rights

The texts, drawings, photographs, films, images, data, databases, software, names, trademarks and domain names, trademarks, logos and other elements of this site are protected by copyright and belong to Cyso Hosting BV. It is prohibited without prior written consent of Cyso Hosting BV to store (other than required for the website to view), reproduce, modify, publish, distribute or transmit, sell or otherwise transfer or grant any rights to third parties of information found on the website.

Unauthorized use of the website

You commit yourself to (1) not use the information in an unlawful matter (2) not use the website in any way that causes the website to be damaged, corrupted, interrupted, stop, or otherwise made less efficient (3) not use the website for transmission or posting of computer viruses or for transmission or posting of material of a slanderous, obscene or threatening nature (4) not use website in such a manner that would infringe on the rights of a natural person, legal or association, including, but not limited to, rights of privacy and intellectual property (5) not use the website for posting or transmission of material for promotional or publicity purposes without prior permission from Cyso Hosting BV, except if so requested by the recipient.

Links to other websites

This website may contain links to websites or web pages of third parties or otherwise refer to these. Cyso Hosting BV has no control over the content or other features of these websites or web pages and is in no way liable for the content or features. Any links by Cyso Hosting BV do not in any way imply approval of the content of these websites or web pages.

Advice on the website

Where, through the website, directly or indirectly, advice is offered regarding medical, legal, financial or other personal or business decisions, this advice is without any guarantee and without any liability on the part of Cyso Hosting BV. You always need a specialist to consult for additional information regarding the advice on your specific situation.

Applicable Law and Jurisdiction

Dutch law is applicable to this website.

Abuse and anti-spam policy

What is spam ?

‘Sending a message, especially an advertisement, to more than five recipients, is by itself spamming unless the individuals have specifically requested to be added to a mailing list on that topic. This includes both commercial advertisements and informational messages sent to recipients via electronic mail (email) as well as off-topic messages posted in Usenet discussion groups where the recipient has not requested or invited the message. Email is a person-to-person medium, not a broadcast medium.’

Our spam Policy, why?

Unlike senders of traditional “junk mail” who are required to pay for envelopes, materials and postage, senders of UBE/UCE can, given the nature of the internet, impose enormous costs on the recipients of their messages at little or no cost to themselves.
Costs imposed on UBE/UCE recipients include:

  • ISP bandwidth used to deliver UBE/UCE
  • additional IP infrastructure needed to handle UBE/UCE
  • time and money wasted in filtering out and deleting UBE/UCE.
Our policy
  • Customers are not allowed to transmit bulk unsolicited commercial email (“UCE”) or unsolicited bulk email (“UBE”) messages to any Internet user via their Cyso address-space or via any other Internet connection that in any way implicates the Cysof net blocks. This also counts if you are using a different provider to mail and have the intended site hosted at Cyso.
  • Customers are not allowed to temporarily or permanently connect an insufficiently secured mail server to the Cyso network. Your mail server is only allowed to accept incoming email that is destined for your own email domain(s), and it is only allowed to transmit outgoing email that originates inside your own IP range or local network. Under no circumstance is your mail server allowed to accept email from outside your network for subsequent delivery outside your network. In short: your mail server must be either a starting point or an end point for email, not a transit point. Cyso explicitly reserves the right to block an insufficiently secured mail server without advance notice.
  • Bulk mailing is only allowed using OPT-IN mailings.Iif databases are used in which the receiver did not authorize YOU, the mailer, to use his email address, will be seen as UBE/UCE and we will act accordingly, upon receiving of complaints.
  • When being notified of an alleged violation of our spam policy by you or one of your customers, Cyso will initiate an immediate investigation (within 48 hours of notification). During the investigation, Cyso may restrict customer access to the network to prevent further violations. If a customer is found to be in violation of our spam policy, Cyso may, at its sole discretion, restrict, suspend or terminate customer’s account. In case of being a First Time Offender, depending on the severity you.ll receive an official warning.
  • The next time a customer is found to be in violation of our spam policy, Cyso will remove your DNS records without advance notice. This will stay so for 48 hours, thereafter it can be added again. For each time we receive complaints we’ll keep repeating this procedure so the mailing will cause no benefit. If your server was used to send spam we’ll setup a lock on port 25 (SMTP) for your IP’s. (Second Time Offender)
  • When we keep receiving complaints Cyso can and will terminate the customers account.
  • Cyso has the right to block traffic from or to other networks to prevent receiving or broadcasting UBE/UCE. This may result in temporarily loss of connection to other networks.

The Dutch version of our spam policy prevails.

If you have any questions regarding the above, please contact

Acceptable Use Policy

This English text is for your convenience. For legal reasons the Dutch version of this text will prevail!

If Cyso has provided you with a shell account, the following additional rules apply:

  1. You are not allowed to use the servers for illegal activities such as: spam, hacking, port scanning and harassing. We decide what’s illegal or not and our decision is final!
  2. It’s not allowed to use the servers to distribute warez, illegal software or MP3 and other copyrighted materials. We decide what’s illegal or not and our decision is final!
  3. Never give out your username and password to someone else. The account belongs to you only. It’s your responsibility!
  4. Don’t use large amounts of CPU time / memory or bandwith
  5. Don’t exceed your diskquota.

Please report abuse at Violation of the rules will indefinitely lead to cancellation of your account.

Fair Use Policy

This English text is offered for your convenience. For legal reasons the Dutch version of this text will prevail!

To keep the costs of hosting your website and e-mail low, a lot of people use a shared hosting solution. In this solution the server is shared with different users. This is usually not a problem, as a server is capable of handling hundreds of websites. To make sure everybody gets what he pays for there is one rule:

  • Your website / email may not use a disappropriate amount of system resources on the server.

This rule is to prevent that a single website uses so much resources, that other websites would be work slowly of even not work at all.

in violation

If you’re in violation of our Fair use Policy we will contact you and work with you on a different solution. In some cases more efficient programming makes a website run better or maybe a dedicated server is the solution. The main goal our Fair use policy is to avoid abuse.

Domain Registration Policy

Registering Internet domain names though Cyso is subject to the following policies:

ICANN Policies

All parties registering ICANN-managed internet domains through Cyso Hosting B.V. are required to be familiar with ICANN’s generic educational information as described here. Furthermore, parties must comply with ICANN’s Registrants Benefits and Responsibilities.

Renewal Policy

Unless specified otherwise, all domains registered through Cyso will be renewed automatically. Customers need to inform Cyso at least 30 days before the expiry date which domains do not need to be renewed. Failure to indicate this is time for domains involved will result in automatic renewal and billing accordingly.

Restoring a non-renewed domain during the domain’s redemption period is possible. Fees may vary depending on the TLD.

RIPE conditions

Customers who request dedicated IPv4 and/or IPv6 addresses or ranges from Cyso are required to be able to justify the reason. When requesting dedicated IP addresses, Cyso may request the arguments behind it and judge them according to RIPE policies.

Microsoft terms

Customers using Microsoft software licenses through Cyso, are required to comply with Microsoft’s End User License Terms. These are provided with their contract. Using licenses provided by Cyso is only allowed as long as their contract with Cyso lasts.

Procedure Notice and Takedown

The following procedure applies if Cyso receives complaints about material offered by one of its customers and is hosted within Cyso’s network. This procedure follows the guidelines of the Dutch Hosting Provider Association and was compiled by ICTRecht.

Note: this is an English version of an original Dutch document, translated for your convenience. The Dutch version of this document prevails at all times.

Intermediary: Cyso Hosting B.V.
Client: Cyso Hosting B.V.’s client.

  1. If Intermediary receives a complaint through the complaint form, it shall confirm the receipt of the reporter as soon as possible. Intermediary checks the data as much as they can. In case of missing or incorrect information provided through the complaint form by the reporter, Intermediary will ask the reporter to provide additional information.
  2. In case the information is not or no longer online or is hosted by another provider, the Intermediary informs the reporter about this party. The complaint will then be considered resolved.
  3. If the reporter has not previously contacted the Client, Intermediary passes on the complaint to the Customer with a period of two working days to respond, and informs the reporter about passing on the complaint. Intermediary forwards the Client’s response to the reporter. He can then respond to Intermediary whether or not he agrees with the response. If so, then the complaint will be considered dealt with. Intermediary informs the Client about this. In case of an absence of a response by the Client within two business days, Intermediary will carry out the following steps.
  4. If the reporter asked for removal of the material, but the Client is unwilling to remove or modify the information, Intermediary will make its own assessment:
    1. If Intermediary itself considers the complaint to be justified and there is no question of an emergency, he will ask the Client to remove the material. If the Client has not removed it within 1 day, Intermediary will delete or block the material and informs the Client and reporter that this has happened. Intermediary explains the removal to the Client. The complaint is considered resolved.
    2. If Intermediary itself considers the complaint to be unfounded, it will inform the reporter about its motivation. The complaint is considered resolved.
  5. If the reporter asked for identification of the Client, but the Client does not want to reveal himself to the reporter, Intermediary will make its own assessment:
    1. If Intermediary itself considers the complaint to be justified and the reporter to have a real stake in identification of the Client, Intermediary will provide name and address (location data) from the Client to the reporter and inform the Client thereof. The complaint is considered resolved.
    2. If Intermediary itself considers the complaint to be unfounded, or the reporter has no real stake to identification of the Client, it will inform the reporter about its motivation. The complaint is considered resolved.
  6. If in the opinion of Intermediary, a case should be considered urgent or an emergency, then Intermediary will go through the above steps within one working day. The reporter has to motivate an emergency notification. Based on this motivation, the Intermediary will determine whether the notification will be handled within one business day.
  7. In case of a criminal interest, Intermediary can decide to leave the information online for these reasons. In this case, Intermediary will inform only the reporter.
  8. In addition to the above (external) procedure, Intermediary may go through the following internal steps themselves.

Additional steps at points 4 and/or 5:

  • If Intermediary itself is unable or unwilling to comment on the complaint, it will send the information received about the complaint to its legal adviser.
  • The legal advisor will inform the Intermediary about the steps to follow. Intermediary is responsible for the implementation and informs the Client and reporter about this. The complaint is considered resolved.

When actually removing or making materials inaccessible, Intermediary will act carefully and in proportion, with Intermediary preventing, as much as possible, legal material of the Client or others being made inaccessible.

Call me back